Tuesday 16 April 2013

The history of Hacking


I have remodified this History of hacking based on St. Petersburg times newspaper


The history of computer hacking can be traced back to the 1870s, but I will emphasize on the most recent years for simplicity.
The 1960s

    It all started at MIT’s (Massachusetts Institute of Technology) artificial intelligence lab.The university’s mainframe computers were used by the first hackers. At first, hacker was a name with a positive significance for a person who was good at computers and could push computer programs beyond the normal functioning standard. It was a borrowed name from a term to describe members of a model train group at MIT who hacked the electric trains and switches to make them perform faster, better and differently.



The 1970s

    John Draper was the talk of the 70s because of his ability to make free calls. He built a "blue box" that, when used together with the whistle and phone receiver, phone calls would be made for free. He was arrested on several counts for tampering with the phone lines throughout the 70s. Steve Jobs, Steve Wozniak (founders of apple computer) used this knowledge.



The early 1980s 

    People often say the public was lured into hacking by the movie war game. The main character was Matthew Broderick. It is said that the movie made hackers seem cyber heroes which captured the imagination of young minds in this year.

    Hacking groups like Legion of Doom in the United States, and Chaos Computer Club in Germany began to emerge. Sherwood Forest and Catch-22 were used by phreaks and hackers to interact, and share stolen passwords and credit card numbers.

    Los Alamos labaoratory’s computers for developing nuclear weapons were hacked by the 414 gang. A gang that comprised of six teenagers who were later apprehended by the law.


The Late 1980s

    The Computer Fraud and Abuse Act was passed in 1986
    A self-replicating worm was use on the government's ARPAnet to test its effect on UNIX systems by Robert T. Morris, Jr., a graduate student at Cornell University. Which later spread to 6000 computers. He was fined 10,000 USD.

    Some German hackers were arrested for breaking into the United States government and corporate computers and sold operating-system source code to the Russian KGB.




The early 1990s

    A radio stations phone system was rigged by three hacker-friends during a call-in contest. They won 20 000USD, two cars and all expense paid trips.

    The use of internet came in and hackers started formulating new strategies.

    Kevin Mitnick was arrested for stealing 20,000 credit card numbers.

    Vladimir Levin and other Russian crackers siphoned 10 million USD from Citibank and transfer it to bank accounts in Finland and Israel.



The late 1990s
    The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice. Once installed on a machine with Windows 95 or Windows 98 Operating systems, it allows unauthorized remote access to the machine.
    A 19-year-old Israeli hacker Ehud Tenenbaum known as Analyzer was arrested for breaking into pentagon’s computers and stealing some software.



The 2000s 

Well, the popular attacks in the 2000s are,
    the attacks launched on yahoo, Amazon and eBay, that resulted to the denial of service for users.


    Break-ins on Microsoft, for latest versions of their products. The 2001 attack that led to the prevention of millions of users from reaching Microsoft Web pages for two days.


This brief history of Hacking and cracking above is meant to serve as a quick reference point to those who really want to know how it all started. That's why its been in summary. Its good to know the history of most things we do. 

Download torrents Without Torrent Client!


A unique online service called Torrent2exe allows users to download torrents without having to install a torrent client by converting the torrent file into a standalone EXE file. Using Torrent2exe is very simple. Copy the URL of the torrent file or browse to the location of the torrent file in your hard disk to automatically upload it to their site. Once you they have got the URL of the torrent file, they will convert it into a self extracting EXE file.
Here you get the option to select the size of the EXE file to be downloaded. Suppose you want to see a movie. What will you require? A media player and the movie. Now you get two choices.
Firstly, you download the movie and the media player, which needs to be downloaded only once. Subsequent movie downloads do not require you to download the movie player since you have already downloaded it.
However, if you move to another computer you will need to download the movie player once again. This is the "small size".
In the second choice, you download the movie along with the media player every time you download a new movie. This is the "normal size"
After you have download the converted EXE file, just run it and it will automatically start downloading the torrent.
The standalone EXE file makes it easier for people to share files and applications on the Internet. You can publish the EXE files on your site or blog to make the downloads easy for visitors, send EXE files to your friends who don't want to be bothered with installing the client.
Torrent2exe is available both as an online service and as a desktop application.

Remove duplicate files the easy way

I have always wanted this kind of software. I have thousands of mp3 songs packed in various partitions of my hard disk. I have collected these songs from several places and keep them storing, but the problem while augmenting my collection is that I am never sure whether I have copied the set of songs before or not, so I just copy them irrespective of the fact that they may be already present. The consequence is that my limited 40GB hard disk space is almost full leaving me with no more space to store anything else.
That is why I always wanted a software that could compare the contents of two folders and remove the duplicate elements.


File Comparator is a program which compares any files by their contents. This utility allow you to quickly compare contents of any files in specified folders, and allow to show files which contain same data.